To think exaltation reading comprehension ability want to be malicious to grasp a basic achievement first, commit to memory a list a phrase, extension oneself of vocabulary quantity.
要想提高阅读理解能力,首先要狠抓基本功,熟记单词,扩大自己的词汇量。
While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.
尽管限制浏览器只浏览信任站点可以减少受到攻击的风险,恶意代码可以被植入任何的网站。
They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.
他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
But compensation shall be made for malicious damage caused to another person by a trademark registrant.
但是,因商标注册人的恶意给他人造成损失的,应当予以赔偿。
Be sure to think outside the box and consider any tools that malicious users may employ to penetrate your security.
确保摆脱思维的束缚,并考虑恶意用户可能采用来渗透安全层的任何工具。
Wealthy investors from almost every industry, from finance to Hollywood, are terrified that the next money manager they choose might turn out to be nothing more than a malicious conman.
各行各业的投资者,不论是金融业,还是好莱坞,都害怕自己所选择的理财人可能就是恶毒的骗子。
This would be a big mistake; it would allow malicious users to inject code that would be executed on your server.
这样会使恶意用户乘机注入将在服务器上执行的代码。
Both types of entities might be used to create denial of service attacks or other malicious documents when used with a Web browser's rendering engine.
当这两种类型的实体与Web浏览器的呈现引擎一起使用时,可能被用于创建拒绝服务攻击或其他恶意文档。
Torpig is a type of malicious software called a Trojan that hides in infected computers, allowing them to be controlled remotely.
Torpig是一种称为“特洛伊木马”的恶意软件,隐藏在受感染的电脑中。
Laughter can be used to show who is boss and malicious laughter is an effective weapon of intimidation.
笑可以用来表示谁才是老大;一个恶意的笑也可以成为恐吓的有力武器。
For example, once a malicious party has somehow stolen a legitimate message created by a sender, the message could be forwarded to anyone.
例如,一旦有恶意的一方以某种方式窃取了由发送方创建的合法消息,该消息就有可能被转发给任何人。
Still, deviations can be used in other scenarios than just to detect fraud or malicious manipulation.
除了检测欺诈行为或恶意操纵外,偏差还可以用于其他一些场景。
For every server, there must be a client — and that client can be susceptible to attacks by a malicious server.
对每个服务器,必须有一个客户端——客户端容易被恶意服务器进行攻击。
If anyone were to remove the casing in a malicious attempt to remove components, the appliance is disabled and must be sent back to IBM to be reset before it can be used again.
如果任何人想要恶意地去掉外壳以移除其中的组件,那么设备将被禁用且必须被送回IBM来进行重置,这样才能够再次使用。
Several security enhancements are included, from closing script vulnerabilities to phishing protection, but most of them won't affect your work unless you happen to be writing malicious code.
这包括若干安全增强,例如关闭脚本漏洞和欺骗保护。而且,大部分增强不会影响您的工作,除非您正打算编写恶意代码。
If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.
如果有不怀好意的使用者覆写缓冲区,则会变更标志的值,从而指出攻击者是非法存取专用文件。
If the application has XSS holes, the attacker may send a malicious script that can still be executed by the application and lead to XSS intrusions.
如果应用程序有xss漏洞,攻击者就可能会发送能被应用程序执行的恶意脚本,导致XSS侵入。
You can be exposed to attackers through a malicious fake website, or even through a familiar website that has been hacked.
访问恶意假冒网站,甚至是被入侵的熟悉网站,你都会暴露在黑客的眼中。
There doesn’t have to be anything malicious about it (although there might be). It’s the inevitable result of giving the boss the subjective power to define and judge another’s performance.
这并不一定存在任何恶意的揣测(虽然有可能存在),若给了管理层这样的主观的权力去定义或者评价其他人的工作表现的话,这样的情形就将会是必然的结果。
Alternately, a malicious sender may be able to claim that it has sent a message only once even though it has actually sent the message more than one time.
反过来说,恶意的发送方也可能声称他仅发送过一次消息,即使事实上它发送了不止一次。
It's evidence that people will be malicious and try to compromise peoples' health using computers, especially if neural devices become more widespread.
很明显,会有人存心不良,想用电脑危机别人的健康,尤其当神经装置更加普及时。
Malicious code can be hidden in fonts that automatically load when a user opens a PDF file, allowing a hacker to take control of the device.
恶意代码可以隐藏在字体中,当用户打开PD F文档时自动加载,从而允许黑客完全控制手机。
There doesn't have to be anything malicious about it (although there might be). It's the inevitable result of giving the boss the subjective power to define and judge another's performance.
这并不一定存在任何恶意的揣测(虽然有可能存在),若给了管理层这样的主观的权力去定义或者评价其他人的工作表现的话,这样的情形就将会是必然的结果。
The term attacker can be used to describe a malicious hacker.
词汇攻击者可用来描述恶意黑客。
Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE.
是的,似乎如果想让恶意代码生效,用户还是得使用IE浏览器。
The data levels or categories can be set up arbitrarily, but typically they group data according to the level of damage that would occur if the data is accessed by someone with malicious intent.
数据级别或分类可任意设置,但通常是根据恶意用户访问数据造成的破坏程度分组的。
It would be possible for someone to maliciously corrupt the counter property via an unprotected update, but that same malicious party could do the same thing with a normal update cycle.
可能有人会恶意地通过未保护更新破坏计数器属性,但这种破坏也可以发生在常规的更新中。
In this following example, taken from the Microsoft blog, a malicious program (circled in red) is pretending to be the safe option (circled in green) of viewing and opening files.
在下面这个例子里(取自Microsoft博客),一个恶意程序(红圈)假装成某一安全的查看和打开文件选项(绿圈)。
This statement is vulnerable to SQL injection - quotes in $_GET['username'] are not escaped and will be concatenated as part of the statement text, which can result in malicious behavior.
这条语句就容易受到SQL注入的威胁 —— $_GET['username'] 中的引号没有转义,因此将被加入到语句文本中,这样可以导致恶意的行为。
This statement is vulnerable to SQL injection - quotes in $_GET['username'] are not escaped and will be concatenated as part of the statement text, which can result in malicious behavior.
这条语句就容易受到SQL注入的威胁 —— $_GET['username'] 中的引号没有转义,因此将被加入到语句文本中,这样可以导致恶意的行为。
应用推荐